CN104468459B - A kind of leak detection method and device - Google Patents

A kind of leak detection method and device Download PDF

Info

Publication number
CN104468459B
CN104468459B CN201310413831.7A CN201310413831A CN104468459B CN 104468459 B CN104468459 B CN 104468459B CN 201310413831 A CN201310413831 A CN 201310413831A CN 104468459 B CN104468459 B CN 104468459B
Authority
CN
China
Prior art keywords
access request
login account
loophole
site access
target user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310413831.7A
Other languages
Chinese (zh)
Other versions
CN104468459A (en
Inventor
辛霄
刘剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310413831.7A priority Critical patent/CN104468459B/en
Publication of CN104468459A publication Critical patent/CN104468459A/en
Application granted granted Critical
Publication of CN104468459B publication Critical patent/CN104468459B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The present invention relates to a kind of leak detection methods, include the following steps:When receiving the site access request of client transmission, judge whether site access request comes from target user;If site access request comes from target user, after using site access request access target website, the response page of targeted sites return is obtained;Targeted sites are detected according to the response page and whether there is loophole, obtain testing result.The present invention also provides a kind of Hole Detection devices.Loophole existing for website can be found in time using the present invention.

Description

A kind of leak detection method and device
Technical field
The specific embodiment of the invention is related to technical field of network security, more particularly to a kind of leak detection method and device.
Background technology
In the network technology, loophole refers to the safety defect in network system.The presence of loophole enables attacker not Network system is accessed or destroyed in the case of mandate.Web loopholes typically refer to the loophole on procedure site, and Web loopholes may be Caused by written in code person is when writing code due to inconsiderate congruence.Common Web loopholes are for example including SQL (Structured Query Language, structured query language)Injection loophole, XSS(Cross Site Scripting, Cross-site scripting attack)Loophole, upload loophole etc..
Currently, the method for finding Web loopholes is mainly to be realized by the vulnerability scanning system for website.It should Vulnerability scanning system collects web page address by means such as web crawlers(URL, Uniform Resource Locator, also known as Uniform resource locator)List and the corresponding parameter of each web page address and type, then according to each webpage of loophole Feature Library Address corresponds to the loophole attack test request of targeted sites, and whether the information responded further according to targeted sites judges the targeted sites There are specific loopholes.
However, collecting the web page address and corresponding parameter and type that webpage is embedded in by web crawlers means, not only Can there is a problem of that web page address covering is not complete, while can also capture a large amount of useless static resource links, cause system resource Waste.In addition, loophole feature database is typically to be collected and formulated by the maintenance personnel of vulnerability scanning system, it is also possible to there is leakage Hole feature covers infull problem.Therefore, the loophole attack test request gone out according to the loophole Feature Library possibly can not and The emerging loopholes of Shi Faxian have that the response time is long to emerging loophole.
Invention content
In view of this, it is necessary to provide a kind of leak detection method and device, can in time find existing for website Loophole, and reduce the waste of system resource.
A kind of leak detection method, includes the following steps:When receiving the site access request of client transmission, judge Whether site access request comes from target user;If site access request comes from target user, visited using the website After asking request access target website, the response page of targeted sites return is obtained;Targeted sites are detected according to the response page With the presence or absence of loophole, testing result is obtained.
A kind of Hole Detection device, including:Judgment module, for when the site access request for receiving client transmission When, judge whether site access request comes from target user;Acquisition module, if being used from target for site access request Family obtains the response page of targeted sites return then after using site access request access target website;Detect mould Block whether there is loophole for detecting targeted sites according to the response page, obtain testing result.
Compared to the prior art, leak detection method and device of the present invention, by the site access from target user The monitoring of request, and the infomation detection targeted sites asked in response to the site access according to targeted sites are with the presence or absence of leakage Hole can find loophole existing for website, and reduce the waste of system resource in time.
For the above and other objects, features and advantages of the present invention can be clearer and more comprehensible, preferred embodiment cited below particularly, And coordinate institute's accompanying drawings, it is described in detail below.
Description of the drawings
Fig. 1 is a kind of structure diagram of server.
Fig. 2 is environment schematic when leak detection method provided in an embodiment of the present invention is applied.
Fig. 3 is the flow chart for the leak detection method that first embodiment of the invention provides.
Fig. 4 is the method flow diagram for establishing target user data library.
Fig. 5 be judge site access request whether the method flow diagram from target user.
Fig. 6 is the flow chart for the leak detection method that second embodiment of the invention provides.
Fig. 7 is the block diagram for the Hole Detection device that third embodiment of the invention provides.
Fig. 8 is the block diagram for the Hole Detection device that fourth embodiment of the invention provides.
Specific implementation mode
Further to illustrate that the present invention is the technological means and effect realized predetermined goal of the invention and taken, below in conjunction with Specific implementation mode, structure, feature and its effect according to the present invention is described in detail as after in attached drawing and preferred embodiment.
Fig. 1 shows a kind of structure diagram of server.As shown in Figure 1, server 1 includes one or more(In figure only Show one)Memory 11, processor 12, storage control 13, Peripheral Interface 14, communication module 15, input unit 16 and aobvious Show unit 17.These components are mutually communicated by one or more communication bus/signal wire.
It will appreciated by the skilled person that structure shown in FIG. 1 is only to illustrate, not to the knot of server 1 It is configured to limit.For example, server 1 may also include than shown in Fig. 1 more either less components or with shown in Fig. 1 Different configurations.Hardware, software, or its combination realization may be used in each component shown in FIG. 1.
Memory 11 can be used for storing software program and module, such as the leak detection method and dress in the embodiment of the present invention Corresponding program instruction/module is set, processor 12 is stored in software program and module in memory 11 by operation, to Application and data processing are performed various functions, that is, realizes above-mentioned leak detection method.
Memory 11 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 11 can further comprise The memory remotely located relative to processor 12, these remotely located memories can pass through network connection to server 1. The example of above-mentioned network includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 12 and other possible components the access of memory 11 can be carried out under the control of storage control 13.
Peripheral Interface 14 couples various input/output devices to processor 12 and memory 11.Processor 12 is run The various functions of various softwares, instruction and execute server 1 in memory 11 and progress data processing.
Communication module 15 with communication network or other equipment for being communicated.Specifically, communication module 15 for example may be used To be network interface card.Network interface card as in LAN connect computer and transmission medium interface, for realizing with local network transport medium Between physical connection matched with electric signal, to establish LAN and be connected to internet(Internet), with various networks As LAN, Metropolitan Area Network (MAN), wide area network are communicated.Network interface card may include the various existing circuit elements for executing above-mentioned function Part, such as processor and memory(Including ROM and RAM)Deng.
Input unit 16 can be used for receiving the character information of input, and generate related with user setting and function control Keyboard, mouse, operating lever, optics or trace ball signal input.Specifically, input unit 16 may include button 161 and Touch-control surface 162.Button 161 for example may include the character keys for inputting character, and the control for triggering control function Button processed.The example of control button includes " returning to main screen " button, on/off button, camera button etc..Touch-control surface 162 Collectable user is on it or neighbouring touch operation(For example user uses any suitable objects or attachment such as finger, stylus Operation in touch-control surface 162 or near touch-control surface 162), and the corresponding connection of driving according to a pre-set procedure Device.Optionally, touch-control surface 162 may include both touch detecting apparatus and touch controller.Wherein, touch detection fills The touch orientation of detection user is set, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch control Device receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 12, and can receiving area It manages the order that device 12 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch-control surface 162.In addition to touch-control surface 162, input unit 16 can also include other input equipments.Above-mentioned Other input equipments include but not limited to one or more in physical keyboard, trace ball, mouse, operating lever etc..
Display unit 17 is used to show information input by user, is supplied to user information and server 1 it is various Graphic interface.These graphical user interface can be made of figure, text, icon, video and its arbitrary combination.In a reality In example, display unit 17 includes a display panel 171.The display panel 171 may be, for example, a liquid crystal display panel (Liquid Crystal Display, LCD), Organic Light Emitting Diode(Organic Light-Emitting Diode Display, OLED)Display panel, electrophoretic display panel(Electro-Phoretic Display,EPD)Deng.Further, Touch-control surface 162 may be disposed on display panel 171 to constitute an entirety with display panel 171.
As shown in fig.2, environment schematic when being applied for leak detection method provided in an embodiment of the present invention.In this reality It applies in example, which is applied in above-mentioned server 1, which can pass through network 2 and an at least end End, such as the progress network communication of terminal 3 in Fig. 2.Wherein, which may include one or more server, certainly should Server 1 can also be virtual cloud computing module.The specific example of the terminal 3 includes but is not limited to desktop computer, just Take formula computer, smart mobile phone, tablet computer, personal digital assistant or other similar arithmetic units.The network 2 can be Arbitrary internetwork connection mode, such as internet(Internet), mobile Internet(2G, 3G net provided such as telecom operators Network), LAN(It is wired or wireless)Deng.
First embodiment
As shown in fig.3, first embodiment of the invention provides a kind of leak detection method, the leak detection method include with Lower step:
Step S1 judges whether site access request comes from when receiving the site access request of client transmission Target user;
Step S2 is using site access request access target station if site access request comes from target user After point, the response page of targeted sites return is obtained;
Step S3 detects targeted sites according to the response page and whether there is loophole, obtains testing result.
According to above-mentioned leak detection method, by the monitoring to the site access request from target user, and according to The infomation detection targeted sites that targeted sites are asked in response to the site access whether there is loophole, can find network in time Loophole existing for website, and reduce the waste of system resource.
In some instances, the realization details of each step of the above method is as follows:
The client of client website visiting tool such as can be browser described in step S1.The website visiting work Tool is erected in server 1, and the client of the website visiting tool is then installed and run in the terminal 3.User The website, such as social network sites, shopping website etc. in internet can be accessed by the client.
In the present embodiment, user using the client before accessing each website, it is also necessary to first pass through effective Login account logs in the website visiting tool.Specifically, the process for logging in the website visiting tool includes:User visits to website Ask that the client input login account of tool, the login account can be the user name applied in advance and password;The client will The login account send to server 1 and verifies its validity;When server 1 verify the login account it is effective when, user successfully logs in The website visiting tool, so as to, to targeted sites transmitting station access request, access corresponding target by the client Website.
The site access request will be sent out according to the operation of user on the client.For example, when user is in the client When inputting web page address in the address input field at end, the site access request that inputted web page address corresponds to targeted sites is sent out. Further for example, when the user clicks the web page interlinkage of the insertion in a certain webpage or in document when, send out the web page interlinkage and correspond to target The site access of website is asked.Current login account for example including the client in site access request, targeted sites The information such as the corresponding parameter of web page address of web page address, the targeted sites.The corresponding parameter is for example including current search Keyword, Source Site, browser type, targeted sites label etc..
In addition, in the present embodiment, also needing to first establish a target user data library before executing the step S1.The mesh Mark customer data base can be stored in the memory 11 of server 1.Record has each target in the target user data library The login account of user.The target user refer to due to profession is good at or hobby etc., may be to website It throws doubt upon with the presence or absence of loophole, to send out the user that loophole attack test is asked to corresponding website.Therefore, target The loophole attack test request being likely to be to targeted sites is compared in the site access request that user sends out.And by target The site access request that user sends out is monitored, and also more has an opportunity to find loophole existing for targeted sites.
Specifically, as shown in fig.4, the method for establishing target user data library may comprise steps of:
Step S41 collects the corresponding interesting data of each login account registered.The interesting data can be used for reflect with Interest tendency when the associated customer access network of corresponding login account.For example, tending to check when some customer access networks Topical news, some tend to browse shopping website, and the website in terms of some then tend to browse network safe practice.
Shown in Fig. 4, the step S41 can specifically include following steps:
Step S411, the network for monitoring each login account registered access behavior.The network access behavior for example including The corresponding webpage of institute's input address is accessed, another webpage is searched on a webpage, delivers picture or word etc. on webpage The behaviors such as the document content in content, browsing webpage.The network, which accesses behavior, to be embodied by keyword, such as the pass Term that keyword inputs when can be the content title and keyword, search and webpage of the accessed webpage of each login account, in net The keyword making comments or leave a message on page, the title published an article on webpage and label etc..
After a login account logs in the website visiting tool and accesses corresponding web page, step S411 steps on this The corresponding network of record account is accessed behavior and is recorded in a manner of above-mentioned keyword, such as is recorded in the memory 11, For the corresponding interesting data of subsequent analysis login account.In the present embodiment, it can specify that the primary net to a login account Network accesses behavior and only extracts specified number, such as two keywords to characterize secondary network access behavior, each time to specification Network accesses the corresponding keyword number of behavior, avoids, because the corresponding keyword quantity of certain networks access behavior is excessive, making At subsequently inaccurate to the analysis of the interesting data.For example, when the login account has accessed one at a time about bug excavation Webpage, then can be extracted from the webpage " bug excavation " and " network security " two keywords indicate the login account should Secondary network accesses behavior.
Step S412 accesses behavioural analysis according to the network and goes out the corresponding interesting data of each login account.In an example In, behavior can be accessed to the network of each login account and counted, i.e., behavior be accessed to the corresponding network of each login account Keyword is counted, and calculates the corresponding each keyword of each login account institute in the corresponding all keywords of the login account The ratio accounted for.It is appreciated that when the corresponding keyword of a login account is in the corresponding all keywords of the login account In shared ratio it is higher, then illustrate that the corresponding network of the keyword accesses that behavior is more frequent, and the corresponding network of the keyword is visited It asks that behavior reflects to a certain extent to be inclined to the interest of the associated user of the login account.
Therefore, if the corresponding keyword of some login account is shared in the corresponding all keywords of the login account Ratio reach a predetermined threshold value, such as 50%, it is determined that the keyword be the login account correspond to one of interesting data.One It may include one or more keywords that a login account, which corresponds to interesting data,.Such as the corresponding interesting data packet of the login account It includes " current events ", " bug excavation " and " network security " etc..
Significantly, since in practical applications, a user as natural person can apply for one or more Login account is for logging in the website visiting tool and accessing website, for belonging to the login account of the same user, The corresponding interesting data of each login account ought to be consistent.However, passing through the login with same user-association collected by step S41 The corresponding interesting data of account may be not consistent.
Therefore, after executing step S41, interesting data corresponding with the login account of same user-association can also be united One.Specifically, can first according to the login time of each login account, log in IP address, log in the information such as place, identify with The login account of same user-association.Then a pair interesting data corresponding with the login account of same user-association takes union, and Using the union as interesting data corresponding with each login account of the same user-association.
Step S42, judges whether the corresponding interesting data of each login account is consistent with specified interest one by one, if so, will The login account is recorded in the target user data library.In the present embodiment, since the target user refers to that relatively have can It can throw doubt upon with the presence or absence of loophole to website, to send out the user of loophole test request to corresponding website. Therefore, the specified interest is such as including interest website invasion or bug excavation.The specified interest can also be by several passes Keyword forms, such as the specified interest includes the keys such as " website invasion ", " bug excavation ", " Web loopholes ", " invasion " Word.In the present embodiment, as long as some or all of corresponding interesting data of a login account specifies interest to be consistent with this, then sentence The disconnected login account is associated with target user, and the login account is recorded in the target user data library.
In conclusion as shown in fig.5, the step S1 judges whether site access request comes from the target user Method may comprise steps of:
Step S51 obtains the current login account of the client from site access request.Specifically, step S51 can To use DPI(Deep Packet Inspection, deep-packet detection)Technology analyzes site access request, thus from the station The current login account of the client is obtained in point access request.
Step S52 judges that the current login account whether there is in the target user data library, if so, judging should Site access request comes from the target user.If it is not, then judging that site access request is not from the target user.
In step S2, if site access request comes from target user, site access request may be target One loophole test request for being directed to the targeted sites of user's construction.Therefore, it directly can ask to come using the site access Access target website, and obtain the response page of targeted sites return.The targeted sites return response page simultaneously also by It is transmitted to client, user is transferred to handle.
Targeted sites are detected according to the response page in step S3 and whether there is loophole, it in the present embodiment, can should Response page is compared with the normal page set by the targeted sites.If the response page is consistent with the normal page, Judge that loophole is not present in the targeted sites.If the response page and the normal page are inconsistent, judge that the targeted sites exist Loophole.The normal page of the targeted sites is that the normal access request asked for non-loophole attack test responds.The target The normal page of website can first pass through the normal access request and be obtained from targeted sites, and be pre-stored in the memory In 11.The testing result includes that the targeted sites whether there is loophole.If the testing result indicates that the targeted sites exist Loophole, then step S3 can also be sent a warning message to the targeted sites, to alert safeguard the targeted sites responsible person should There are loopholes for targeted sites, and some information, such as loophole type etc. for providing the loophole.
In conclusion in leak detection method provided in this embodiment, due to target user be may be to network Website throws doubt upon with the presence or absence of loophole, to send out the user of loophole test request to corresponding website.Pass through foundation And safeguard the target user data library for the login account for including each target user, and the site access from target user is asked It is monitored, if the loophole attack test for the targeted sites that site access request is target user's construction is asked, Loophole existing for the targeted sites can be found in time, shorten the response time to newly starting a leak, while reducing system resource Waste.
Second embodiment
The leak detection method provided according to first embodiment can find loophole existing for the targeted sites in time, contracting The short response time to newly starting a leak.And several pending leakages are preserved in the web page address library of existing vulnerability scanning system The web page address of hole test.The web page address of these pending loophole tests is typically to be collected by modes such as web crawlers, Therefore can there is a problem of that web page address covering is not complete.In addition, there is also loophole spies for the loophole feature database of the vulnerability scanning system Sign covers infull problem.
In order to further solve the above problems, second embodiment of the invention provides a kind of leak detection method, can be The effect in the web page address library and loophole feature database of improving vulnerability scanning system is further functioned as on the basis of first embodiment.Ginseng It reads shown in Fig. 6, second embodiment of the invention provides a kind of leak detection method, compared to the Hole Detection side of first embodiment Method judges that site access request after target user, still further comprises in the step S2:
Step S21 analyzes site access request, and the web page address of targeted sites is extracted from site access request. Likewise, step S21 can also analyze site access request using the DPI technologies, to from site access request Extract the web page address of the targeted sites.
Step S22 judges that the web page address of the targeted sites whether there is in the web page address library of vulnerability scanning system, If it is not, then the web page address of the targeted sites is stored in the web page address library.The web page address library is for making the vulnerability scanning The loophole attack test that system construction corresponds to each web page address in web page address library website is asked.If in the web page address library Web page address covering it is incomplete, then vulnerability scanning system possibly unlapped web page address can not be corresponded to website with the presence or absence of leak Hole is tested.Therefore, if site access request comes from target user, and the web page address of the targeted sites is not present in In the web page address library, then the web page address is stored in the web page address library by step S22, to improve the web page address library.
In addition, after the step S3 obtains the testing result, still further comprise:
Step S23, if the testing result indicates the targeted sites, there are loopholes, extract the leakage of the loophole of targeted sites Hole feature, and according in the loophole feature database for the loophole feature update vulnerability scanning system extracted.In general, the vulnerability scanning system System is asked according to the corresponding loophole attack test of leaky latent structure in the loophole feature database.Therefore, if the loophole is special Sign library does not cover certain loophole feature, then vulnerability scanning system will be unable to the loophole latent structure loophole not covered according to this Attack test is asked, to detect the corresponding loophole of loophole feature not covered present in website.Step S23 After extracting the loophole feature, can first judge in the loophole feature database whether to have included extracted loophole feature. If including not yet extracted loophole feature in the loophole feature database, the loophole feature extracted is added to loophole feature database In, to improve the loophole feature database.
In conclusion the leak detection method of the present embodiment, vulnerability scanning is not present in the web page address of targeted sites In the case of the web page address library of system, which is stored in the web page address library, and exist in the targeted sites and leak In the case of hole, the loophole feature database of vulnerability scanning system is updated according to the loophole feature of the loophole, can improve the net in time Page address library and loophole feature database improve the ability that the vulnerability scanning system finds loophole.
3rd embodiment
As shown in fig.7, third embodiment of the invention provides a kind of Hole Detection device 100 comprising establish module 101, judgment module 102, acquisition module 103 and detection module 104.It is appreciated that above-mentioned each module refers to computer program Or program segment, for executing certain one or more specific function.In addition, the differentiation of above-mentioned each module do not represent it is actual Program code also must be separated.
Module 101 is established, for establishing a target user data library, record has each target to use in the target user data library The login account at family.
Specifically, the corresponding interesting data of each login account registered can first be collected by establishing module 101.In this reality It applies in example, behavior can be accessed by monitoring the network for each login account registered by establishing module 101, then according to the network It accesses behavioural analysis and goes out the corresponding interesting data of each login account.Simultaneously as a user as natural person can apply One or more login accounts, for belonging to the login account of the same user, the corresponding interesting data reason of each login account It should be consistent.It is preferred that it is also unified by interesting data corresponding with the login account of same user-association to establish module 101.
Then, it establishes module 101 and judges whether the corresponding interesting data of each login account is consistent with specified interest one by one, if It is that then the login account is recorded in the target user data library.The specified interest includes that website invasion or loophole are dug Pick.
Judgment module 102, for when receiving the site access request of client transmission, judging that the site access is asked Whether target user is come from.Specifically, judgment module 102 can obtain the current of the client from site access request Then login account judges that the current login account whether there is in the target user data library.If the current login account It is present in the target user data library, then judgment module 102 judges that site access request comes from target user.
Acquisition module 103 is visited if coming from target user for site access request using site access request After asking targeted sites, the response page of targeted sites return is obtained.
Detection module 104 whether there is loophole for detecting targeted sites according to the response page, obtain testing result. In the present embodiment, the response page and the normal page set by the targeted sites can be compared.If the response page Face is consistent with the normal page, then judges that loophole is not present in the targeted sites.If the response page and the normal page are inconsistent, Then judge that there are loopholes for the targeted sites.The testing result includes that the targeted sites whether there is loophole.If the detection knot Fruit indicates the targeted sites there are loophole, then the detection module 104 can also be sent a warning message to the targeted sites, to The responsible person of the targeted sites targeted sites are safeguarded in warning, and there are loopholes.
For the specific work process of above each module, the loophole that can be provided with further reference to first embodiment of the invention is examined Survey method, is not repeated herein.
In conclusion during the realization of Hole Detection device 100 provided in this embodiment, due to target user be compared with It is possible that throwing doubt upon with the presence or absence of loophole to website, to send out the use of loophole test request to corresponding website Family.By establishing and safeguarding the target user data library of the login account including each target user, and to from target user's Site access request is monitored, if the loophole for the targeted sites that site access request is target user's construction is attacked Test request can then find loophole existing for the targeted sites in time, shorten the response time to newly starting a leak, subtract simultaneously The waste of few system resource.
Fourth embodiment
As shown in fig.8, fourth embodiment of the invention provides a kind of Hole Detection device 200, compared to the present invention the The Hole Detection device 100 that three embodiments provide, further comprises:
First update module 201, for judging that site access request comes from target user in the judgment module 102 Afterwards, site access request is analyzed, the web page address of targeted sites is extracted from site access request.The first update mould Block 201 can analyze site access request using DPI technologies, to extract the targeted sites from site access request Web page address.
First update module 201 is additionally operable to judge that the web page address of the targeted sites whether there is in vulnerability scanning In the web page address library of system, if it is not, then the web page address of the targeted sites is stored in the web page address library.
In addition, the Hole Detection device 200 still further comprises:
Second update module 202, for after the detection module 104 obtains the testing result, if the testing result Indicating the targeted sites, there are loopholes, then extract the loophole feature of the loophole of targeted sites, and special according to the loophole extracted In the loophole feature database of sign update vulnerability scanning system.
For the specific work process of above each module, the loophole that can be provided with further reference to second embodiment of the invention is examined Survey method, is not repeated herein.
In conclusion the Hole Detection device 200 of the present embodiment, is not present in loophole in the web page address of targeted sites and sweeps In the case of the web page address library for retouching system, which is stored in the web page address library, and exist in the targeted sites In the case of loophole, the loophole feature database of vulnerability scanning system is updated according to the loophole feature of the loophole, can improve in time should Web page address library and loophole feature database improve the ability that the vulnerability scanning system finds loophole.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium, it is executable to be stored with computer Instruction, above-mentioned computer readable storage medium is, for example, nonvolatile memory such as CD, hard disk or flash memory.It is above-mentioned Computer executable instructions for allow computer or similar arithmetic unit to complete each in above-mentioned leak detection method Kind operation.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though So the present invention has been disclosed with preferred embodiment as above, and however, it is not intended to limit the invention, any those skilled in the art, not It is detached within the scope of technical solution of the present invention, when the technology contents using the disclosure above make a little change or are modified to equivalent change The equivalent embodiment of change, as long as being without departing from technical solution of the present invention content, according to the technical essence of the invention to implementing above Any brief introduction modification, equivalent variations and modification made by example, in the range of still falling within technical solution of the present invention.

Claims (16)

1. a kind of leak detection method, which is characterized in that this approach includes the following steps:
Target user data library is established, record has the login account of each target user in the target user data library, wherein described The step of establishing target user data library includes collecting the corresponding interesting data of each login account registered, and judge one by one each Whether the corresponding interesting data of login account is consistent with specified interest, is used if so, the login account is recorded in the target In user data library;
When receiving the site access request of client transmission, judge whether site access request comes from target user, In, it is described to judge whether site access request includes obtaining the visitor from site access request from the step of target user The current login account at family end, and judge that the current login account whether there is in the target user data library, if so, sentencing Site access request of breaking comes from target user;
If site access request comes from target user, after using site access request access target website, obtaining should The response page that targeted sites return;
Targeted sites are detected according to the response page and whether there is loophole, obtain testing result.
2. leak detection method as described in claim 1, which is characterized in that each login account registered of collecting corresponds to Interesting data the step of include:
The network for monitoring each login account registered accesses behavior;
Behavioural analysis, which is accessed, according to the network goes out the corresponding interesting data of each login account.
3. leak detection method as claimed in claim 2, which is characterized in that each login account registered of collecting corresponds to Interesting data the step of further include:
Interesting data corresponding with the login account of same user-association is unified.
4. leak detection method as described in claim 1, which is characterized in that the specified interest includes website invasion or loophole It excavates.
5. leak detection method as described in claim 1, which is characterized in that judging site access request from target use After the step of family, further include:
Site access request is analyzed, the web page address of targeted sites is extracted from site access request;
Judge that the web page address whether there is in the web page address library of vulnerability scanning system, if it is not, then depositing the web page address Enter in the web page address library.
6. leak detection method as claimed in claim 5, which is characterized in that analyze the website using deep packet inspection technical and visit Ask request.
7. leak detection method as described in claim 1, which is characterized in that after described the step of obtaining testing result, also wrap It includes:
If the testing result indicates the targeted sites there are loophole, extract the loophole feature of the loophole, and according to being extracted Loophole feature updates in the loophole feature database of vulnerability scanning system.
8. leak detection method as described in claim 1, which is characterized in that after described the step of obtaining testing result, also wrap It includes:
If the testing result indicates the targeted sites, there are loopholes, are sent a warning message to the targeted sites.
9. a kind of Hole Detection device, which is characterized in that the device includes:
Module is established, for establishing target user data library, record has the login of each target user in the target user data library Account, wherein the corresponding interesting data of each login account established module collection and registered, and each login account is judged one by one Whether number corresponding interesting data is consistent with specified interest, if so, the login account is recorded in the target user data In library;
Judgment module, for when receiving the site access request of client transmission, judging whether site access request comes From target user, wherein the judgment module obtains the current login account of the client from site access request, and sentences The disconnected current login account whether there is in the target user data library, if so, judging that site access request comes from mesh Mark user;
Acquisition module is asking access target if coming from target user for site access request using the site access After website, the response page of targeted sites return is obtained;
Detection module whether there is loophole for detecting targeted sites according to the response page, obtain testing result.
10. Hole Detection device as claimed in claim 9, which is characterized in that described to collect each login account pair registered The interesting data answered includes:
The network for monitoring each login account registered accesses behavior;
Behavioural analysis, which is accessed, according to the network goes out the corresponding interesting data of each login account.
11. Hole Detection device as claimed in claim 10, which is characterized in that described to collect each login account pair registered The interesting data answered further includes:
Interesting data corresponding with the login account of same user-association is unified.
12. Hole Detection device as claimed in claim 9, which is characterized in that the specified interest includes website invasion or leakage It excavates in hole.
13. Hole Detection device as claimed in claim 9, which is characterized in that further include:
First update module, for judging that site access request after target user, analyzes the station in the judgment module Point access request extracts the web page address of targeted sites from site access request;
First update module is additionally operable to judge that the web page address whether there is in the web page address library of vulnerability scanning system In, if it is not, then the web page address is stored in the web page address library.
14. Hole Detection device as claimed in claim 13, which is characterized in that first update module is examined using deep packet Survey technology analyzes site access request.
15. Hole Detection device as claimed in claim 9, which is characterized in that further include:
Second update module, for after the detection module obtains testing result, if the testing result indicates the targeted sites There are loopholes, then extract the loophole feature of the loophole, and the loophole of vulnerability scanning system is updated according to the loophole feature extracted In feature database.
16. Hole Detection device as claimed in claim 9, which is characterized in that the detection module after obtaining testing result, It is additionally operable to:
If the testing result indicates the targeted sites, there are loopholes, are sent a warning message to the targeted sites.
CN201310413831.7A 2013-09-12 2013-09-12 A kind of leak detection method and device Active CN104468459B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310413831.7A CN104468459B (en) 2013-09-12 2013-09-12 A kind of leak detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310413831.7A CN104468459B (en) 2013-09-12 2013-09-12 A kind of leak detection method and device

Publications (2)

Publication Number Publication Date
CN104468459A CN104468459A (en) 2015-03-25
CN104468459B true CN104468459B (en) 2018-10-02

Family

ID=52913847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310413831.7A Active CN104468459B (en) 2013-09-12 2013-09-12 A kind of leak detection method and device

Country Status (1)

Country Link
CN (1) CN104468459B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404207B (en) * 2015-12-14 2019-09-06 中国电子信息产业集团有限公司第六研究所 A kind of industrial environment bug excavation apparatus and method for
CN105827664B (en) * 2016-06-06 2019-01-29 江苏通付盾科技有限公司 Leak detection method and device
CN108667770B (en) * 2017-03-29 2020-12-18 腾讯科技(深圳)有限公司 Website vulnerability testing method, server and system
CN107749835B (en) * 2017-09-11 2020-11-20 哈尔滨工程大学 Penetration test method for click hijack attack based on prediction
CN110572417B (en) * 2019-10-22 2021-11-09 腾讯科技(深圳)有限公司 Method, apparatus, server and storage medium for providing login ticket
CN111949992B (en) * 2020-08-17 2023-09-29 中国工商银行股份有限公司 Automatic safety monitoring method and system for WEB application program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902456A (en) * 2010-02-09 2010-12-01 北京启明星辰信息技术股份有限公司 Safety defense system of Website
CN102185859A (en) * 2011-05-09 2011-09-14 北京艾普优计算机系统有限公司 Computer system and data interaction method
CN102457500A (en) * 2010-10-22 2012-05-16 北京神州绿盟信息安全科技股份有限公司 Website scanning equipment and method
CN103106285A (en) * 2013-03-04 2013-05-15 中国信息安全测评中心 Recommendation algorithm based on information security professional social network platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5215779B2 (en) * 2008-09-01 2013-06-19 キヤノン株式会社 Information processing apparatus and information processing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902456A (en) * 2010-02-09 2010-12-01 北京启明星辰信息技术股份有限公司 Safety defense system of Website
CN102457500A (en) * 2010-10-22 2012-05-16 北京神州绿盟信息安全科技股份有限公司 Website scanning equipment and method
CN102185859A (en) * 2011-05-09 2011-09-14 北京艾普优计算机系统有限公司 Computer system and data interaction method
CN103106285A (en) * 2013-03-04 2013-05-15 中国信息安全测评中心 Recommendation algorithm based on information security professional social network platform

Also Published As

Publication number Publication date
CN104468459A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN104468459B (en) A kind of leak detection method and device
CN106503134B (en) Browser jumps to the method for data synchronization and device of application program
CN105184159B (en) The recognition methods of webpage tamper and device
CN102104601B (en) Web vulnerability scanning method and device based on infiltration technology
CN103279710B (en) Method and system for detecting malicious codes of Internet information system
EP2790121A1 (en) Client Based Local Malware Detection Method
EP3561708A1 (en) Method and device for classifying uniform resource locators based on content in corresponding websites
CN101490685A (en) A method for increasing the security level of a user machine browsing web pages
CN106101145A (en) A kind of website vulnerability detection method and device
CN107566200B (en) Monitoring method, device and system
CN102739653B (en) Detection method and device aiming at webpage address
CN104486140A (en) Device and method for detecting hijacking of web page
CN113342639B (en) Applet security risk assessment method and electronic device
CN104182478A (en) Website monitoring pre-warning method
CN103618696B (en) Method and server for processing cookie information
KR100912794B1 (en) Web hacking management system and manegement method thereof for real time web server hacking analysis and homepage hacking search
CN103647678A (en) Method and device for online verification of website vulnerabilities
CN104956372A (en) Determining coverage of dynamic security scans using runtime and static code analyses
CN102833212A (en) Webpage visitor identity identification method and system
CN104954340B (en) A kind of detection method and device of agent IP address
CN105488400A (en) Comprehensive detection method and system of malicious webpage
CN107392028A (en) The detection method and its detection means of sensitive information, storage medium, electronic equipment
CN106250761B (en) Equipment, device and method for identifying web automation tool
CN111079138A (en) Abnormal access detection method and device, electronic equipment and readable storage medium
CN107800686A (en) A kind of fishing website recognition methods and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant